2 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
4 - (djm) Implement paranoid priv dropping checks, based on:
5 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
6 Proceedings of USENIX Security Symposium 2002
7 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
8 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
9 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
10 Patch from larsch@trustcenter.de
11 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
12 Patch from larsch@trustcenter.de
15 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
16 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
17 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
18 Patch from larsch@trustcenter.de; ok markus@
19 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
20 larsch@trustcenter.de; ok markus@
21 - (djm) OpenBSD CVS Sync
22 - djm@cvs.openbsd.org 2003/06/04 08:25:18
24 disable challenge/response and keyboard-interactive auth methods
25 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
27 - djm@cvs.openbsd.org 2003/06/04 10:23:48
29 remove duplicated group-dropping code; ok markus@
30 - djm@cvs.openbsd.org 2003/06/04 12:03:59
32 remove bitrotten commet; ok markus@
33 - djm@cvs.openbsd.org 2003/06/04 12:18:49
36 - djm@cvs.openbsd.org 2003/06/04 12:40:39
38 kill ssh process upon receipt of signal, bz #241.
39 based on patch from esb AT hawaii.edu; ok markus@
40 - djm@cvs.openbsd.org 2003/06/04 12:41:22
42 kill ssh process on receipt of signal; ok markus@
43 - (djm) Update to fix of bug #584: lock card before return.
44 From larsch@trustcenter.de
45 - (djm) Always use mysignal() for SIGALRM
48 - (djm) Replace setproctitle replacement with code derived from
50 - (djm) OpenBSD CVS Sync
51 - markus@cvs.openbsd.org 2003/06/02 09:17:34
52 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
53 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
55 deprecate VerifyReverseMapping since it's dangerous if combined
56 with IP based access control as noted by Mike Harding; replace with
57 a UseDNS option, UseDNS is on by default and includes the
58 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
60 - millert@cvs.openbsd.org 2003/06/03 02:56:16
62 Remove the advertising clause in the UCB license which Berkeley
63 rescinded 22 July 1999. Proofed by myself and Theo.
64 - (djm) Fix portable-specific uses of verify_reverse_mapping too
65 - (djm) Sync openbsd-compat with OpenBSD CVS.
66 - No more 4-term BSD licenses in linked code
67 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
70 - (djm) Fix segv from bad reordering in auth-pam.c
71 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
73 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
75 - (djm) Remove "noip6" option from RedHat spec file. This may now be
76 set at runtime using AddressFamily option.
77 - (djm) Fix use of macro before #define in cipher-aes.c
78 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
79 - (djm) OpenBSD CVS Sync
80 - djm@cvs.openbsd.org 2003/05/26 12:54:40
82 fix format strings; ok markus@
83 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
85 seteuid and setegid; markus ok
86 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
88 VerifyHostKeyDNS is v2 only. ok markus@
91 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
93 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
96 - (djm) Avoid auth2-chall.c warning when compiling without
97 PAM, BSD_AUTH and SKEY
100 - (djm) OpenBSD CVS Sync
101 - djm@cvs.openbsd.org 2003/05/24 09:02:22
103 pass logged data through strnvis; ok markus
104 - djm@cvs.openbsd.org 2003/05/24 09:30:40
105 [authfile.c monitor.c sftp-common.c sshpty.c]
106 cast some types for printing; ok markus@
109 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
112 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
113 encoding (which encodes many more characters)
115 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
117 - new sentence, new line
121 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
122 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
123 new sentence, new line
124 - djm@cvs.openbsd.org 2003/05/23 08:29:30
129 - (djm) OpenBSD CVS Sync
130 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
132 use syslog_r() in a signal handler called place; markus ok
133 - (djm) Configure logic to detect syslog_r and friends
136 - (djm) Sync auth-pam.h with what we actually implement
139 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
141 - (djm) OpenBSD CVS Sync
142 - djm@cvs.openbsd.org 2003/05/16 03:27:12
143 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
144 add AddressFamily option to ssh_config (like -4, -6 on commandline).
145 Portable bug #534; ok markus@
146 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
148 just in case, put numbers to sscanf %s arg.
149 - markus@cvs.openbsd.org 2003/05/17 04:27:52
150 [cipher.c cipher-ctr.c myproposal.h]
151 experimental support for aes-ctr modes from
152 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
154 - (djm) Remove IPv4 by default hack now that we can specify AF in config
155 - (djm) Tidy and trim TODO
156 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
157 - (djm) Big KNF on openbsd-compat/
158 - (djm) KNF on md5crypt.[ch]
159 - (djm) KNF on auth-sia.[ch]
162 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
165 - (djm) OpenBSD CVS Sync
166 - djm@cvs.openbsd.org 2003/05/15 13:52:10
168 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
169 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
170 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
171 [readconf.c servconf.c]
172 warn for unsupported config option. ok markus@
173 - markus@cvs.openbsd.org 2003/05/15 14:09:21
175 fix 64bit issue; report itojun@
176 - djm@cvs.openbsd.org 2003/05/15 14:55:25
177 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
178 add a ConnectTimeout option to ssh, based on patch from
179 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
180 - (djm) Add warning for UsePAM when built without PAM support
181 - (djm) A few type mismatch fixes from Bug #565
182 - (djm) Guard free_pam_environment against NULL argument. Works around
183 HP/UX PAM problems debugged by dtucker
186 - (djm) OpenBSD CVS Sync
187 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
191 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
192 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
193 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
194 add experimental support for verifying hos keys using DNS as described
195 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
196 ok markus@ and henning@
197 - markus@cvs.openbsd.org 2003/05/14 22:24:42
198 [clientloop.c session.c ssh.1]
199 allow to send a BREAK to the remote system; ok various
200 - markus@cvs.openbsd.org 2003/05/15 00:28:28
202 cleanup unregister of per-method packet handlers; ok djm@
203 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
204 [readconf.c readconf.h servconf.c servconf.h]
205 always parse kerberos options. ok djm@ markus@
206 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
208 add missing freerrset
209 - markus@cvs.openbsd.org 2003/05/15 03:08:29
210 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
211 split out custom EVP ciphers
212 - djm@cvs.openbsd.org 2003/05/15 03:10:52
214 avoid warning; ok jakob@
215 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
217 Make put/get (globed and nonglobed) code more consistant. OK djm@
218 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
220 Teach ls how to display multiple column display and allow users
221 to return to single column format via 'ls -1'. OK @djm
222 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
223 [readconf.c servconf.c]
224 disable kerberos when not supported. ok markus@
225 - markus@cvs.openbsd.org 2003/05/15 04:08:41
228 - (djm) Always parse UsePAM
229 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
230 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
231 - (djm) Tidy Makefile clean targets
232 - (djm) Adapt README.dns for portable
233 - (djm) Avoid uuencode.c warnings
234 - (djm) Enable UsePAM when built --with-pam
235 - (djm) Only build getrrsetbyname replacement when using --with-dns
236 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
238 - (djm) Bug #444: Wrong paths after reconfigure
239 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
242 - (djm) Bug #117: Don't lie to PAM about username
243 - (djm) RCSID sync w/ OpenBSD
244 - (djm) OpenBSD CVS Sync
245 - djm@cvs.openbsd.org 2003/04/09 12:00:37
247 strip trailing whitespace from config lines before parsing.
248 Fixes bz 528; ok markus@
249 - markus@cvs.openbsd.org 2003/04/12 10:13:57
251 hide cipher details; ok djm@
252 - markus@cvs.openbsd.org 2003/04/12 10:15:36
255 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
257 document -V switch, fix wording; ok markus@
258 - markus@cvs.openbsd.org 2003/04/14 14:17:50
259 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
260 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
261 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
263 Missing globfree(&g) in process_put() spotted by Vince Brimhall
264 <VBrimhall@novell.com>. ok@ Theo
265 - markus@cvs.openbsd.org 2003/04/16 14:35:27
267 document struct Authctxt; with solar
268 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
270 -t in usage(); rogier@quaak.org
271 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
272 [sshd.8 sshd_config.5]
273 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
274 Bug #550 and * escaping suggested by jmc@.
275 - david@cvs.openbsd.org 2003/04/30 20:41:07
277 fix invalid .Pf macro usage introduced in previous commit
279 - markus@cvs.openbsd.org 2003/05/11 16:56:48
280 [authfile.c ssh-keygen.c]
281 change key_load_public to try to read a public from:
282 rsa1 private or rsa1 public and ssh2 keys.
283 this makes ssh-keygen -e fail for ssh1 keys more gracefully
284 for example; report from itojun (netbsd pr 20550).
285 - markus@cvs.openbsd.org 2003/05/11 20:30:25
286 [channels.c clientloop.c serverloop.c session.c ssh.c]
287 make channel_new() strdup the 'remote_name' (not the caller); ok theo
288 - markus@cvs.openbsd.org 2003/05/12 16:55:37
290 for pubkey authentication try the user keys in the following order:
291 1. agent keys that are found in the config file
293 3. keys that are only listed in the config file
294 this helps when an agent has many keys, where the server might
295 close the connection before the correct key is used. report & ok pb@
296 - markus@cvs.openbsd.org 2003/05/12 18:35:18
298 typo: DSA keys are of type ssh-dss; Brian Poole
299 - markus@cvs.openbsd.org 2003/05/14 00:52:59
301 ranges for per auth method messages
302 - djm@cvs.openbsd.org 2003/05/14 01:00:44
304 emphasise the batchmode functionality and make reference to pubkey auth,
305 both of which are FAQs; ok markus@
306 - markus@cvs.openbsd.org 2003/05/14 02:15:47
307 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
308 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
309 server interops with commercial client; ok jakob@ djm@
310 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
312 - better formatting in SYNOPSIS
315 - markus@cvs.openbsd.org 2003/05/14 08:57:49
317 http://bugzilla.mindrot.org/show_bug.cgi?id=560
318 Privsep child continues to run after monitor killed.
319 Pass monitor signals through to child; Darren Tucker
320 - (djm) Make portable build with MIT krb5 (some issues remain)
321 - (djm) Add new UsePAM configuration directive to allow runtime control
322 over usage of PAM. This allows non-root use of sshd when built with
324 - (djm) Die screaming if start_pam() is called when UsePAM=no
325 - (djm) Avoid KrbV leak for MIT Kerberos
326 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
327 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
330 - (djm) Redhat spec: Don't install profile.d scripts when not
331 building with GNOME/GTK askpass (patch from bet@rahul.net)
334 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
335 "make install". Patch by roth@feep.net.
336 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
337 problem on Linux (fixes "could not set controlling tty" errors).
338 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
339 proper challenge-response module
340 - (djm) 2-clause license on loginrec.c, with permission from
344 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
345 Patch from vinschen@redhat.com.
348 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
352 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
353 privsep should now work.
354 - (dtucker) Move handling of bad password authentications into a platform
355 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
358 - (djm) Add back radix.o (used by AFS support), after it went missing from
359 Makefile many moons ago
360 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
361 - (djm) Fix blibpath specification for AIX/gcc
362 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
365 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
369 - (bal) Bug #541: return; was dropped by mistake. Reported by
371 - (bal) Since we don't support platforms lacking u_int_64. We may
372 as well clean out some of those evil #ifdefs
373 - (bal) auth1.c minor resync while looking at the code.
374 - (bal) auth2.c same changed as above.
377 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
378 from matth@eecs.berkeley.edu
379 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
380 - (djm) OpenBSD CVS Sync
381 - markus@cvs.openbsd.org 2003/04/02 09:48:07
382 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
383 [readconf.h serverloop.c sshconnect2.c]
384 reapply rekeying chage, tested by henning@, ok djm@
385 - markus@cvs.openbsd.org 2003/04/02 14:36:26
387 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
388 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
391 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
393 remove $OpenBSD$, as other *.c does not have it.
394 - markus@cvs.openbsd.org 2003/04/07 08:29:57
396 typo: get correct counters; introduced during rekeying change.
397 - millert@cvs.openbsd.org 2003/04/07 21:58:05
399 The UCB copyright here is incorrect. This code did not originate
400 at UCB, it was written by Luke Mewburn. Updated the copyright at
401 the author's request. markus@ OK
402 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
404 rename log() into logit() to avoid name conflict. markus ok, from
406 - (djm) XXX - Performed locally using:
407 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
408 - hin@cvs.openbsd.org 2003/04/09 08:23:52
410 Don't include <krb.h> when compiling with Kerberos 5 support
411 - (djm) Fix up missing include for packet.c
412 - (djm) Fix missed log => logit occurance (reference by function pointer)
415 - (bal) if IP_TOS is not found or broken don't try to compile in
416 packet_set_tos() function call. bug #527
419 - (djm) OpenBSD CVS Sync
420 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
421 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
422 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
424 - new sentence new line
427 - markus@cvs.openbsd.org 2003/04/01 10:10:23
428 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
429 [readconf.h serverloop.c sshconnect2.c]
430 rekeying bugfixes and automatic rekeying:
431 * both client and server rekey _automatically_
432 (a) after 2^31 packets, because after 2^32 packets
433 the sequence number for packets wraps
434 (b) after 2^(blocksize_in_bits/4) blocks
435 (see: draft-ietf-secsh-newmodes-00.txt)
436 (a) and (b) are _enabled_ by default, and only disabled for known
437 openssh versions, that don't support rekeying properly.
438 * client option 'RekeyLimit'
439 * do not reply to requests during rekeying
440 - markus@cvs.openbsd.org 2003/04/01 10:22:21
441 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
442 [readconf.h serverloop.c sshconnect2.c]
443 backout rekeying changes (for 3.6.1)
444 - markus@cvs.openbsd.org 2003/04/01 10:31:26
445 [compat.c compat.h kex.c]
446 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
447 tested by ho@ and myself
448 - markus@cvs.openbsd.org 2003/04/01 10:56:46
451 - (djm) Crank spec file versions
452 - (djm) Release 3.6.1p1
455 - (djm) OpenBSD CVS Sync
456 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
458 one last fix to the tree: race fix broke stuff; pr 3169;
459 srp@srparish.net, help from djm
462 - (djm) Fix getpeerid support for 64 bit BE systems. From
463 Arnd Bergmann <arndb@de.ibm.com>
466 - (djm) OpenBSD CVS Sync
467 - markus@cvs.openbsd.org 2003/03/23 19:02:00
469 unbreak rekeying for privsep; ok millert@
471 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
472 Report from murple@murple.net, diagnosis from dtucker@zip.com.au